In many cases, the end of the year gives you time to step back and take stock of the last 12 months. This is when many of us take a hard look at what worked and what did not, complete performance reviews, and formulate plans for the coming year. For me, it is all of those things plus a time when I u...

Cellebrite, the leading developer and provider of mobile data forensic
solutions, today released an update to its software that extends its
physical and file system extraction support to a range of popular HTC
and Motorola devices on which such deep access was previously
impossible, along with physical extraction support for the global
best-seller Samsung Galaxy S3 and the Galaxy Note II.

The new support relies on Cellebrite’s well-known proprietary user lock
bypass methods. These methods provide the deep access to mobile devices
that forensic examiners need to complete their extractions of existing,
hidden and deleted data.

By adding the 109 new models, Cellebrite more than doubles the number of
devices it supports via bypass methods. User lock bypass is now
supported on a total of 212 Android smartphone models, a full third of
the number of devices Cellebrite supports for logical (existing data
only) extractions. This provides a depth of support for Android
smartphones that is unmatched by any other vendor in the mobile
forensics industry.

“Our ability to build successful cases depends on our forensic tools’
ability to extract the maximum amount of data, both existing and hidden
or deleted, from the cell phones that people are buying and using,” said
Troy Lawrence, a detective with the Fort Worth (Texas) Police
Department. “Even devices that were popular a year or two ago still
regularly show up in our labs, along with new best-sellers.”

User lock bypass is now available for the first time on 66 HTC and 35
Motorola devices, including HTC’s Evo, Incredible, Wildfire and Desire
models along with Motorola’s Milestone, Droid Razr and Razr Maxx.
Cellebrite also continues its advanced physical support for the Samsung
Galaxy series by extending its user lock bypass capability from the
Galaxy S and S2 to the Galaxy S3 GT-i9300 (international version) and
the Galaxy Note II. The bypass methods work even when USB debugging is
disabled.

“The support we have added for these popular devices demonstrates
Cellebrite’s continued commitment to anticipating and responding to
forensic examiners’ and investigators’ immediate needs,” said Ron
Serber, co-CEO and Chief Technology Officer at Cellebrite. “Until now,
these devices were an inaccessible ‘black box’ to examiners. Our
research and development team worked for many months to develop the
ability to bypass any user lock and extract needed evidence, an ability
which shortens our customers’ investigative cycle times and helps them
build better cases.”

The new physical extraction capabilities are available immediately.

About UFED

Cellebrite’s UFED provides cutting-edge solutions for physical, logical
and file system extraction of data and passwords from thousands of
legacy and feature phones, smartphones , portable GPS devices, and
tablets with ground-breaking physical extraction capabilities for the
world’s most popular platforms – BlackBerry®, iOS, Android, Nokia,
Windows Mobile, Symbian and Palm and more.

Founded in 1999, Cellebrite is a global company known for its
technological breakthroughs in the cellular industry. A world leader and
authority in mobile data technology, Cellebrite established its mobile
forensics division in 2007, with the Universal Forensic Extraction
Device (UFED). Cellebrite’s range of mobile forensic products, UFED
Series, enable the bit-for-bit extraction and in-depth decoding and
analysis of data from thousands of mobile devices, including feature
phones, smartphones, portable GPS devices, tablets and phones
manufactured with Chinese chipsets.

Cellebrite’s UFED Series is the prime choice of forensic specialists in
law enforcement, military, intelligence, corporate security and
eDiscovery agencies in more than 60 countries.

Cellebrite is a wholly-owned subsidiary of the Sun Corporation, a listed
Japanese company (6736/JQ)

BlackBerry® is a registered trademark of Research in Motion (RIM) Corp.
Android™ is a trademark of Google Inc. iPhone® is a trademark of Apple
Inc., registered in the United States and other countries.

DevOps is under attack because developers don’t want to mess with infrastructure. They will happily own their code into production, but want to use platforms instead of raw automation. That’s changing the landscape that we understand as DevOps with both architecture concepts (CloudNati...

"As we've gone out into the public cloud we've seen that over time we may have lost a few things - we've lost control, we've given up cost to a certain extent, and then security, flexibility," explained Steve Conner, VP of Sales at Cloudistics,in this SYS-CON.tv interview at 20th Cloud...

You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a w...

Is advanced scheduling in Kubernetes achievable?Yes, however, how do you properly accommodate every real-life scenario that a Kubernetes user might encounter? How do you leverage advanced scheduling techniques to shape and describe each scenario in easy-to-use rules and configurations?...

As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget...

While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings...